Global Cooperation in Cyberspace

Mobilize governments and companies to develop and implement norms of behavior in cyberspace and address cyber crime, encryption and security risks from connected devices.

The Objective 

The objective of the Global Cooperation in Cyberspace program is to reduce conflict, crime and other disruptions in cyberspace and promote stability, innovation and inclusion.

The Challenge    

Cyber is at the nexus of the greatest security threats the world faces. The innovation that creates so many efficiencies and connections is also a source of risk. Unproven technology contains vulnerabilities that malicious actors exploit. Roles and capabilities for maintaining security and protecting freedom are muddied. The structure of the global economy is shifting on its axis. Social media connects us with our loved ones and provides platforms for disruptive disinformation. Cyber weapons destabilize longstanding international security arrangements. The divide among digital haves and have-nots remains significant; billions of users are expected to connect to cyberspace over the next several years, creating new opportunities as well as societal vulnerabilities and risk, particularly in the Global South.

The Opportunity

Global cooperation is essential to successfully address existing and emerging conflicts—both in cyberspace and across all areas of human endeavor. To this end, the EastWest Institute began its cyber work in 2009 as the pioneer organization that initiated a global dialogue on cyberspace security, diplomacy and deterrence. Past successes have helped shorten repair times for damaged undersea cablesreduce spam on a global basis, promote balanced encryption policies, build bilateral confidence and trust between East and West to improve crisis response and combat malicious hackers, and develop norms of responsible behavior in cyberspace.

Working with government, business and civil society leaders from around the world, the program has highlighted three objectives to be pursued towards a safer and more secure Internet:

  • Promote cybersecurity defenses to increase the costs and reduce the benefits cyber attackers can expect.
  • ​Advocate for limits on the use of cyberspace and cyber tools for offensive purposes.
  • Facilitate enhanced operational collaboration across borders and among adversaries.

The Process

The Global Cooperation in Cyberspace program utilizes the EastWest Institute’s proven trust building process—convene, reframe and mobilize:

1. Convene:

EWI convenes many meetings, including bilateral and trilateral country-to-country discussions, focused workshops on specific topics, and broader strategy development roundtables. In recent years, EWI has hosted sessions on the geopolitical and economic effects of cybersecurity at the Munich Security Conference; a workshop on protectionist government actions in the global ICT market; and a dialogue on trilateral cyberspace cooperation between China, India and the United States.

The EastWest Institute has also convened policymakers, business leaders, technical experts and civil society through its Global Cyberspace Cooperation Summits. The summits provide a crucial forum for building international, private-public actions to foster international cooperation in cyberspace and have taken place in DallasLondonNew DelhiSilicon ValleyBerlinNew York and Berkeley. Each summit brought together between 200 and 400 leaders from more than 40 countries to craft solutions to threats facing our digital world.

2. Reframe:

In 2020, the program will continue to develop and advocate for recommended changes in national and corporate policies and procedures. The principal means of developing these recommendations is through the work of five collaborative breakthrough groups, composed of decision-makers from key sectors around the world:

As recommendations mature, EWI leads the preparation of reports detailing and supporting the conclusions. The latest report, Weathering TechNationalism: A Security and Trustworthiness Framework to Manage Cyber Supply Chain Risk, was released in May 2020. The report provides a framework to overcome the trust gap between ICT buyers, vendors, and operators and their respective governments instead of relying on "TechNationalism”—measures that favor ICT products and services sold by companies headquartered domestically or in allied states—to improve overall ICT security.

Before that, Cyber Insurance and Systemic Market Risk was released in June 2019. This report provides an analytical framework to better understand and address the systemic nature of cyber risk and the challenges it presents to the growing cyber insurance market. The report emphasizes the role of the insurance industry, risk management firms and governments as drivers for robust cyber standards, resiliency, and security, through a set of proposed policy recommendations. In February 2019, the program published, Smart and Safe: Risk Reduction in Tomorrow’s Cities. This guide is geared toward city executives and policymakers, to raise awareness and offer recommendations on the key issues and challenges associated with deploying smart technologies and the Internet of Things in urban environments. In February 2018 at the Munich Security Conference, the program released Encryption Policy in Democratic Regimes: Finding Convergent Paths and Balanced Solutions. This report recommends ways to balance the legitimate needs of law enforcement with cybersecurity and privacy. In 2016 the program published Purchasing Secure ICT Products and Services: A Buyers Guide which offered a structure for conversations between ICT buyers and suppliers, enabling governments and organizations to manage the risks they face from cybersecurity vulnerabilities in the commercial products and services they use. 

EWI also co-directs the Secretariat for the Global Commission on the Stability of Cyberspace (GCSC) alongside The Hague Centre for Strategic Studies. The Commission, which was launched at the 2017 Munich Security Conference, is a global body working to develop proposals for norms and policy initiatives to improve the stability and security of cyberspace. Co-chaired by Michael Chertoff, former U.S. Secretary of Homeland Security, and Latha Reddy, India’s former national security advisor, the 26 Commissioners bring governmental, industry, technical and civil society perspectives on cyberspace from north and south, east and west.

A non-governmental body, the GCSC complements other global initiatives such as the work of the United Nations Group of Governmental Experts. In 2017, the Commission released a “Call to Protect the Public Core of the Internet” and a "Call to Protect the Electoral Infrastructure." In 2018, the Commission released a Norm Package that contains six new norms including:

  • Norm to Avoid Tampering
  • Norm Against Commandeering of ICT Devices into Botnets
  • Norm for States to Create a Vulnerability Equities Process
  • Norm to Reduce and Mitigate Significant Vulnerabilities
  • Norm on Basic Cyber Hygiene as Foundational Defense
  • Norm Against Offensive Cyber Operations by Non-State Actors

In November 2019, the Global Commission on the Stability of Cyberspace issued its final report, Advancing Cyberstability, which represents the culmination of the Commission’s work over the last three years, offering a framework to advance cyberstability, a set of four principles, six recommendations, and eight norms that address critical elements of implementation, monitoring and accountability.

3. Mobilize:

The EastWest Institute mobilizes a global network of policymakers and specialists, all serving voluntarily, to advocate for policy breakthroughs. It will lead the mobilization for advocacy of the recommendations it develops—as well as those of its fellows and breakthrough groups—in capitals and corporate headquarters worldwide.


The Global Cooperation in Cyberspace program thrives on the support and leadership provided by:

Supporters Partners
Microsoft William and Flora Hewlett Foundation
Huawei Technologies Global Forum on Cyber Expertise
Unisys Munich Security Conference
JPMorgan Chase M3AAWG
The Hague Centre for Strategic Studies Fudan University
Media Coverage | 06/16/2020
News | 10/05/2018
Media Coverage | 07/09/2018
Media Coverage | 04/11/2018
Media Coverage | 03/09/2018
Media Coverage | 02/20/2018
News | 01/31/2018
Media Coverage | 01/09/2018
News | 11/03/2017
News | 10/06/2017
Media Coverage | 09/07/2017
Media Coverage | 08/21/2017
News | 08/14/2017
Commentary | 05/09/2017
News | 03/16/2017
Global Cyberspace Cooperation Summit VII - Day II
News | 03/15/2017
Media Coverage | 01/30/2017
Media Coverage | 01/03/2017
Commentary | 09/21/2016
Media Coverage | 08/01/2016
Media Coverage | 08/31/2015
Commentary | 07/31/2015
Commentary | 10/26/2014
Media Coverage | 05/15/2014
Commentary | 04/30/2014
Media Coverage | 11/07/2013
Who’s Behind China’s Cyber Spying?
Commentary | 09/26/2013
EWI Welcomes Bruce McConnell
News | 09/09/2013
Syria: Preparing for the Cyber Threat
Commentary | 09/06/2013
New Strategies for Cyberspace
Commentary | 08/05/2013
Huffington Post Highlights EWI Cyber Efforts
Media Coverage | 06/12/2013
EastWest Direct: A Chinese View
Commentary | 05/29/2013
Shaky Cyber Trigger Fingers
Commentary | 05/28/2013
Media Coverage | 05/27/2013
Jaws, Nuclear Weapons and Cyber War
Commentary | 05/06/2013
China's Cyber Weakness
Commentary | 04/05/2013
Media Coverage | 12/21/2012
News | 10/30/2012
News | 10/29/2012
China's Reach in Cyberspace
Commentary | 10/15/2012
India: An Emerging Cyber Power
Commentary | 09/25/2012
New Thinking on Protecting the Internet
Commentary | 09/19/2012
Huawei’s Take on Cyber Spying
Commentary | 09/10/2012
The Failed Cybersecurity Act of 2012
Commentary | 08/08/2012
Commentary | 12/22/2011
Commentary | 12/13/2011
WSC8 Media Coverage
Media Coverage | 10/18/2011
Commentary | 10/04/2011
Commentary | 09/26/2011
Commentary | 07/07/2011
Commentary | 06/01/2011
Commentary | 03/08/2011
Commentary | 02/28/2011
Commentary | 02/23/2011
Commentary | 02/17/2011
Cybersecurity Won’t Get Solved at the UN
Media Coverage | 01/31/2011
Commentary | 11/29/2010
International Cyber Diplomacy Needs Unmet
Media Coverage | 10/29/2010
Commentary | 10/01/2010
Commentary | 07/28/2010
Policy Report | 05/18/2020
Policy Report | 06/05/2019
Publications | 04/26/2018
Discussion Paper | 12/10/2015
Policy Report | 10/21/2015
Event Report | 03/16/2015
Discussion Paper | 01/20/2015
Critical Terminology Foundations 2
Policy Report | 03/21/2014
Policy Report | 01/31/2014
Policy Report | 10/21/2013
Building Trust in Cyberspace
Event Report | 12/19/2012
Priority International Communications
Policy Report | 10/10/2012
The Internet Health Model for Cybersecurity
Discussion Paper | 06/02/2012
Mobilizing for International Action
Event Report | 08/03/2011
Fighting Spam to Build Trust
Policy Report | 05/27/2011
Policy Report | 02/03/2011
Protecting the Digital Economy
Event Report | 01/10/2011
Global Cyber Deterrence
Discussion Paper | 04/15/2010
Podcasts | 10/15/2019
Podcasts | 09/16/2019
Infographics | 07/15/2013
Infographics | 04/15/2013
Videos | 02/13/2013
Images | 05/12/2010